default search action
BibTeX records: Xuxian Jiang
@inproceedings{DBLP:conf/uss/HeZ00L0YJ21, author = {Ningyu He and Ruiyi Zhang and Haoyu Wang and Lei Wu and Xiapu Luo and Yao Guo and Ting Yu and Xuxian Jiang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{EOSAFE:} Security Analysis of {EOSIO} Smart Contracts}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1271--1288}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-ningyu}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/HeZ00L0YJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/HuangWWTLZLHJ20, author = {Yuheng Huang and Haoyu Wang and Lei Wu and Gareth Tyson and Xiapu Luo and Run Zhang and Xuanzhe Liu and Gang Huang and Xuxian Jiang}, title = {Understanding (Mis)Behavior on the {EOSIO} Blockchain}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {4}, number = {2}, pages = {37:1--37:28}, year = {2020}, url = {https://doi.org/10.1145/3392155}, doi = {10.1145/3392155}, timestamp = {Tue, 22 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pomacs/HuangWWTLZLHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HeWWGJ20, author = {Ningyu He and Lei Wu and Haoyu Wang and Yao Guo and Xuxian Jiang}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Characterizing Code Clones in the Ethereum Smart Contract Ecosystem}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {654--675}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_35}, doi = {10.1007/978-3-030-51280-4\_35}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/HeWWGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/HuangWWTLZLHJ20, author = {Yuheng Huang and Haoyu Wang and Lei Wu and Gareth Tyson and Xiapu Luo and Run Zhang and Xuanzhe Liu and Gang Huang and Xuxian Jiang}, editor = {Edmund Yeh and Athina Markopoulou and Y. C. Tay}, title = {Understanding (Mis)Behavior on the {EOSIO} Blockchain}, booktitle = {Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, Boston, MA, USA, June, 8-12, 2020}, pages = {83--84}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3393691.3394223}, doi = {10.1145/3393691.3394223}, timestamp = {Mon, 02 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/HuangWWTLZLHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-05369, author = {Yuheng Huang and Haoyu Wang and Lei Wu and Gareth Tyson and Xiapu Luo and Run Zhang and Xuanzhe Liu and Gang Huang and Xuxian Jiang}, title = {Characterizing {EOSIO} Blockchain}, journal = {CoRR}, volume = {abs/2002.05369}, year = {2020}, url = {https://arxiv.org/abs/2002.05369}, eprinttype = {arXiv}, eprint = {2002.05369}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06568, author = {Ningyu He and Ruiyi Zhang and Lei Wu and Haoyu Wang and Xiapu Luo and Yao Guo and Ting Yu and Xuxian Jiang}, title = {Security Analysis of {EOSIO} Smart Contracts}, journal = {CoRR}, volume = {abs/2003.06568}, year = {2020}, url = {https://arxiv.org/abs/2003.06568}, eprinttype = {arXiv}, eprint = {2003.06568}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00272, author = {Ningyu He and Lei Wu and Haoyu Wang and Yao Guo and Xuxian Jiang}, title = {Characterizing Code Clones in the Ethereum Smart Contract Ecosystem}, journal = {CoRR}, volume = {abs/1905.00272}, year = {2019}, url = {http://arxiv.org/abs/1905.00272}, eprinttype = {arXiv}, eprint = {1905.00272}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MaoBMJLJ18, author = {Jian Mao and Jingdong Bian and Hanjun Ma and Yaoqi Jia and Zhenkai Liang and Xuxian Jiang}, title = {Robust Detection of Android {UI} Similarity}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422189}, doi = {10.1109/ICC.2018.8422189}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MaoBMJLJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/JiangSZ16, author = {Xuxian Jiang and Kapil Singh and Yajin Zhou}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {AppShell: Making data protection practical for lost or stolen Android devices}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {502--508}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502850}, doi = {10.1109/NOMS.2016.7502850}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/JiangSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ElishSYRJ15, author = {Karim O. Elish and Xiaokui Shu and Danfeng (Daphne) Yao and Barbara G. Ryder and Xuxian Jiang}, title = {Profiling user-trigger dependence for Android malware detection}, journal = {Comput. Secur.}, volume = {49}, pages = {255--273}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.11.001}, doi = {10.1016/J.COSE.2014.11.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ElishSYRJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouPWWJ15, author = {Yajin Zhou and Kunal Patel and Lei Wu and Zhi Wang and Xuxian Jiang}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Hybrid User-level Sandboxing of Third-party Android Apps}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {19--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714598}, doi = {10.1145/2714576.2714598}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhouPWWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhouWWJ15, author = {Yajin Zhou and Lei Wu and Zhi Wang and Xuxian Jiang}, title = {Harvesting developer credentials in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {23:1--23:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766499}, doi = {10.1145/2766498.2766499}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RheeRLJX14, author = {Junghwan Rhee and Ryan D. Riley and Zhiqiang Lin and Xuxian Jiang and Dongyan Xu}, title = {Data-Centric {OS} Kernel Malware Characterization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {1}, pages = {72--87}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2291964}, doi = {10.1109/TIFS.2013.2291964}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RheeRLJX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RastogiCJ14, author = {Vaibhav Rastogi and Yan Chen and Xuxian Jiang}, title = {Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {1}, pages = {99--108}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2290431}, doi = {10.1109/TIFS.2013.2290431}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RastogiCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunZLJ14, author = {Mingshen Sun and Min Zheng and John C. S. Lui and Xuxian Jiang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Design and implementation of an Android host-based intrusion prevention system}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {226--235}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664245}, doi = {10.1145/2664243.2664245}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunZLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangLJH14, author = {Ning Zhang and Wenjing Lou and Xuxian Jiang and Y. Thomas Hou}, title = {Enabling Trusted Data-intensive execution in cloud computing}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {355--363}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997504}, doi = {10.1109/CNS.2014.6997504}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangLJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouWZJ14, author = {Wu Zhou and Zhi Wang and Yajin Zhou and Xuxian Jiang}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {{DIVILAR:} diversifying intermediate language for anti-repackaging on android platform}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {199--210}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557558}, doi = {10.1145/2557547.2557558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouWZJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuZPLJ14, author = {Chiachih Wu and Yajin Zhou and Kunal Patel and Zhenkai Liang and Xuxian Jiang}, title = {AirBag: Boosting Smartphone Resistance to Malware Infection}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/airbag-boosting-smartphone-resistance-malware-infection}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuZPLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouSJ14, author = {Yajin Zhou and Kapil Singh and Xuxian Jiang}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Owner-Centric Protection of Unstructured Data on Smartphones}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {55--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_4}, doi = {10.1007/978-3-319-08593-7\_4}, timestamp = {Wed, 25 Sep 2019 18:21:56 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/JiangZ13, author = {Xuxian Jiang and Yajin Zhou}, title = {Android Malware}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-7394-7}, doi = {10.1007/978-1-4614-7394-7}, isbn = {978-1-4614-7393-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/JiangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouZJ13, author = {Wu Zhou and Xinwen Zhang and Xuxian Jiang}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {AppInk: watermarking android apps for repackaging deterrence}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484315}, doi = {10.1145/2484313.2484315}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoXJ13, author = {Weiliang Luo and Shouhuai Xu and Xuxian Jiang}, editor = {Yan Chen and XiaoFeng Wang}, title = {Real-time detection and prevention of android {SMS} permission abuses}, booktitle = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, pages = {11--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417.2484422}, doi = {10.1145/2484417.2484422}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuoXJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RastogiCJ13, author = {Vaibhav Rastogi and Yan Chen and Xuxian Jiang}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {DroidChameleon: evaluating Android anti-malware against transformation attacks}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {329--334}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484355}, doi = {10.1145/2484313.2484355}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RastogiCJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGZWJ13, author = {Lei Wu and Michael C. Grace and Yajin Zhou and Chiachih Wu and Xuxian Jiang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The impact of vendor customizations on android security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {623--634}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516728}, doi = {10.1145/2508859.2516728}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZGJZ13, author = {Wu Zhou and Yajin Zhou and Michael C. Grace and Xuxian Jiang and Shihong Zou}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Fast, scalable detection of "Piggybacked" mobile applications}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {185--196}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435377}, doi = {10.1145/2435349.2435377}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZGJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuWJ13, author = {Chiachih Wu and Zhi Wang and Xuxian Jiang}, title = {Taming Hosted Hypervisors with (Mostly) Deprivileged Execution}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/taming-hosted-hypervisors-mostly-deprivileged-execution}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhouJ13, author = {Yajin Zhou and Xuxian Jiang}, title = {Detecting Passive Content Leaks and Pollution in Android Applications}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/detecting-passive-content-leaks-and-pollution-android-applications}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhouJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DengX0J12, author = {Zhui Deng and Dongyan Xu and Xiangyu Zhang and Xuxian Jiang}, title = {IntroLib: Efficient and transparent library call introspection for malware forensics}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S13--S23}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.013}, doi = {10.1016/J.DIIN.2012.05.013}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DengX0J12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcisys/MaoWJ12, author = {Guojun Mao and Xindong Wu and Xuxian Jiang}, title = {Intrusion Detection Models Based on Data Mining}, journal = {Int. J. Comput. Intell. Syst.}, volume = {5}, number = {1}, pages = {30--38}, year = {2012}, url = {https://doi.org/10.1080/18756891.2012.670519}, doi = {10.1080/18756891.2012.670519}, timestamp = {Mon, 07 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcisys/MaoWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TranDLJ12, author = {Minh Tran and Xinshu Dong and Zhenkai Liang and Xuxian Jiang}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {418--435}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_25}, doi = {10.1007/978-3-642-31284-7\_25}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/TranDLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiide/BarikHRJ12, author = {Titus Barik and Brent E. Harrison and David L. Roberts and Xuxian Jiang}, editor = {Mark O. Riedl and Gita Sukthankar}, title = {Spatial Game Signatures for Bot Detection in Social Games}, booktitle = {Proceedings of the Eighth {AAAI} Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE-12, Stanford, California, USA, October 8-12, 2012}, publisher = {The {AAAI} Press}, year = {2012}, url = {http://www.aaai.org/ocs/index.php/AIIDE/AIIDE12/paper/view/5444}, timestamp = {Tue, 12 Apr 2022 13:09:30 +0200}, biburl = {https://dblp.org/rec/conf/aiide/BarikHRJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EnckJ12, author = {William Enck and Xuxian Jiang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {CCS'12 co-located workshop summary for {SPSM} 2012}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1062--1063}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382330}, doi = {10.1145/2382196.2382330}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EnckJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZJN12, author = {Wu Zhou and Yajin Zhou and Xuxian Jiang and Peng Ning}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Detecting repackaged smartphone applications in third-party android marketplaces}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {317--326}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133640}, doi = {10.1145/2133601.2133640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/WangWGJ12, author = {Zhi Wang and Chiachih Wu and Michael C. Grace and Xuxian Jiang}, editor = {Pascal Felber and Frank Bellosa and Herbert Bos}, title = {Isolating commodity hosted hypervisors with HyperLock}, booktitle = {European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13, 2012}, pages = {127--140}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2168836.2168850}, doi = {10.1145/2168836.2168850}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/WangWGJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/GraceZZZJ12, author = {Michael C. Grace and Yajin Zhou and Qiang Zhang and Shihong Zou and Xuxian Jiang}, editor = {Nigel Davies and Srinivasan Seshan and Lin Zhong}, title = {RiskRanker: scalable and accurate zero-day android malware detection}, booktitle = {The 10th International Conference on Mobile Systems, Applications, and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29, 2012}, pages = {281--294}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2307636.2307663}, doi = {10.1145/2307636.2307663}, timestamp = {Thu, 31 Oct 2019 15:55:26 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/GraceZZZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GraceZWJ12, author = {Michael C. Grace and Yajin Zhou and Zhi Wang and Xuxian Jiang}, title = {Systematic Detection of Capability Leaks in Stock Android Smartphones}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/systematic-detection-capability-leaks-stock-android-smartphones}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GraceZWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhouWZJ12, author = {Yajin Zhou and Zhi Wang and Wu Zhou and Xuxian Jiang}, title = {Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/hey-you-get-my-market-detecting-malicious-apps-official-and-alternative-android-markets}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhouWZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouJ12, author = {Yajin Zhou and Xuxian Jiang}, title = {Dissecting Android Malware: Characterization and Evolution}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {95--109}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.16}, doi = {10.1109/SP.2012.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhouJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GraceZJS12, author = {Michael C. Grace and Wu Zhou and Xuxian Jiang and Ahmad{-}Reza Sadeghi}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Unsafe exposure analysis of mobile in-app advertisements}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {101--112}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185464}, doi = {10.1145/2185448.2185464}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2012spsm, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2381934}, isbn = {978-1-4503-1666-8}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2012spsm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWBSGJ11, author = {Jinku Li and Zhi Wang and Tyler K. Bletsch and Deepa Srinivasan and Michael C. Grace and Xuxian Jiang}, title = {Comprehensive and Efficient Protection of Kernel Control Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {4}, pages = {1404--1417}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2159712}, doi = {10.1109/TIFS.2011.2159712}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWBSGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MaoLCJ11, author = {Ziqing Mao and Ninghui Li and Hong Chen and Xuxian Jiang}, title = {Combining Discretionary Policy with Mandatory Information Flow in Operating Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {24:1--24:27}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043624}, doi = {10.1145/2043621.2043624}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MaoLCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DongTLJ11, author = {Xinshu Dong and Minh Tran and Zhenkai Liang and Xuxian Jiang}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {297--306}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076774}, doi = {10.1145/2076732.2076774}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DongTLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BletschJF11, author = {Tyler K. Bletsch and Xuxian Jiang and Vincent W. Freeh}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Mitigating code-reuse attacks with control-flow locking}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {353--362}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076783}, doi = {10.1145/2076732.2076783}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BletschJF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BletschJFL11, author = {Tyler K. Bletsch and Xuxian Jiang and Vincent W. Freeh and Zhenkai Liang}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Jump-oriented programming: a new class of code-reuse attack}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {30--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966919}, doi = {10.1145/1966913.1966919}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BletschJFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrinivasanWJX11, author = {Deepa Srinivasan and Zhi Wang and Xuxian Jiang and Dongyan Xu}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {363--374}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046751}, doi = {10.1145/2046707.2046751}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SrinivasanWJX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/PatilDLLJ11, author = {Kailas Patil and Xinshu Dong and Xiaolei Li and Zhenkai Liang and Xuxian Jiang}, title = {Towards Fine-Grained Access Control in JavaScript Contexts}, booktitle = {2011 International Conference on Distributed Computing Systems, {ICDCS} 2011, Minneapolis, Minnesota, USA, June 20-24, 2011}, pages = {720--729}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDCS.2011.87}, doi = {10.1109/ICDCS.2011.87}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/PatilDLLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LinRZXJ11, author = {Zhiqiang Lin and Junghwan Rhee and Xiangyu Zhang and Dongyan Xu and Xuxian Jiang}, title = {SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/siggraph-brute-force-scanning-of-kernel-data-structure-instances-using-graph-based-signatures}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LinRZXJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TranEBJFN11, author = {Minh Tran and Mark Etheridge and Tyler K. Bletsch and Xuxian Jiang and Vincent W. Freeh and Peng Ning}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {On the Expressiveness of Return-into-libc Attacks}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {121--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_7}, doi = {10.1007/978-3-642-23644-0\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/TranEBJFN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SrinivasanJ11, author = {Deepa Srinivasan and Xuxian Jiang}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {209--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_12}, doi = {10.1007/978-3-642-31909-9\_12}, timestamp = {Mon, 24 Jun 2024 20:34:51 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SrinivasanJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/GuDXJ11, author = {Zhongshu Gu and Zhui Deng and Dongyan Xu and Xuxian Jiang}, title = {Process Implanting: {A} New Active Introspection Framework for Virtualization}, booktitle = {30th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2011), Madrid, Spain, October 4-7, 2011}, pages = {147--156}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SRDS.2011.26}, doi = {10.1109/SRDS.2011.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/GuDXJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouZJF11, author = {Yajin Zhou and Xinwen Zhang and Xuxian Jiang and Vincent W. Freeh}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Taming Information-Stealing Smartphone Applications (on Android)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {93--107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_7}, doi = {10.1007/978-3-642-21599-5\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2011spsm, editor = {Xuxian Jiang and Amiya Bhattacharya and Partha Dasgupta and William Enck}, title = {SPSM'11, Proceedings of the 1st {ACM} Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2011, October 17, 2011, Chicago, IL, {USA}}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2046614}, isbn = {978-1-4503-1000-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2011spsm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangWYJ10, author = {Ruishan Zhang and Xinyuan Wang and Xiaohui Yang and Xuxian Jiang}, title = {On the billing vulnerabilities of SIP-based VoIP systems}, journal = {Comput. Networks}, volume = {54}, number = {11}, pages = {1837--1847}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2010.02.007}, doi = {10.1016/J.COMNET.2010.02.007}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhangWYJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RileyJX10, author = {Ryan D. Riley and Xuxian Jiang and Dongyan Xu}, title = {An Architectural Approach to Preventing Code Injection Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {351--365}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.1}, doi = {10.1109/TDSC.2010.1}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RileyJX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JiangWX10, author = {Xuxian Jiang and Xinyuan Wang and Dongyan Xu}, title = {Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {12:1--12:28}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698752}, doi = {10.1145/1698750.1698752}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JiangWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiakhGJ10, author = {Siarhei Liakh and Michael C. Grace and Xuxian Jiang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Analyzing and improving Linux kernel memory protection: a model checking approach}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {271--280}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920301}, doi = {10.1145/1920261.1920301}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiakhGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AzabNWJZS10, author = {Ahmed M. Azab and Peng Ning and Zhi Wang and Xuxian Jiang and Xiaolan Zhang and Nathan C. Skalsky}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {HyperSentry: enabling stealthy in-context measurement of hypervisor integrity}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {38--49}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866313}, doi = {10.1145/1866307.1866313}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AzabNWJZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/LiWJGB10, author = {Jinku Li and Zhi Wang and Xuxian Jiang and Michael C. Grace and Sina Bahram}, editor = {Christine Morin and Gilles Muller}, title = {Defeating return-oriented rootkits with "\emph{Return-Less}" kernels}, booktitle = {European Conference on Computer Systems, Proceedings of the 5th European conference on Computer systems, EuroSys 2010, Paris, France, April 13-16, 2010}, pages = {195--208}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755913.1755934}, doi = {10.1145/1755913.1755934}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/LiWJGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangJ10, author = {Xinyuan Wang and Xuxian Jiang}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Artificial Malware Immunization Based on Dynamically Assigned Sense of Self}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {166--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_15}, doi = {10.1007/978-3-642-18178-8\_15}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RheeRXJ10, author = {Junghwan Rhee and Ryan D. Riley and Dongyan Xu and Xuxian Jiang}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {178--197}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_10}, doi = {10.1007/978-3-642-15512-3\_10}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RheeRXJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GraceWSLJLL10, author = {Michael C. Grace and Zhi Wang and Deepa Srinivasan and Jinku Li and Xuxian Jiang and Zhenkai Liang and Siarhei Liakh}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Transparent Protection of Commodity {OS} Kernels Using Hardware Virtualization}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {162--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_10}, doi = {10.1007/978-3-642-16161-2\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GraceWSLJLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangJ10, author = {Zhi Wang and Xuxian Jiang}, title = {HyperSafe: {A} Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {380--395}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.30}, doi = {10.1109/SP.2010.30}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/BahramJWGLSRX10, author = {Sina Bahram and Xuxian Jiang and Zhi Wang and Mike Grace and Jinku Li and Deepa Srinivasan and Junghwan Rhee and Dongyan Xu}, title = {{DKSM:} Subverting Virtual Machine Introspection for Fun and Profit}, booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010), New Delhi, Punjab, India, October 31 - November 3, 2010}, pages = {82--91}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SRDS.2010.39}, doi = {10.1109/SRDS.2010.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/BahramJWGLSRX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/JiangZ09, author = {Xuxian Jiang and Xingquan Zhu}, title = {vEye: behavioral footprinting for self-propagating worm detection and profiling}, journal = {Knowl. Inf. Syst.}, volume = {18}, number = {2}, pages = {231--262}, year = {2009}, url = {https://doi.org/10.1007/s10115-008-0137-3}, doi = {10.1007/S10115-008-0137-3}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/JiangZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RheeRXJ09, author = {Junghwan Rhee and Ryan D. Riley and Dongyan Xu and Xuxian Jiang}, title = {Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {74--81}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.116}, doi = {10.1109/ARES.2009.116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RheeRXJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangWFYJ09, author = {Ruishan Zhang and Xinyuan Wang and Ryan Farley and Xiaohui Yang and Xuxian Jiang}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {61--69}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533069}, doi = {10.1145/1533057.1533069}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangWFYJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangJCN09, author = {Zhi Wang and Xuxian Jiang and Weidong Cui and Peng Ning}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Countering kernel rootkits with lightweight hook protection}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {545--554}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653728}, doi = {10.1145/1653662.1653728}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangJCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CarboneCLLPJ09, author = {Martim Carbone and Weidong Cui and Long Lu and Wenke Lee and Marcus Peinado and Xuxian Jiang}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Mapping kernel objects to enable systematic integrity checking}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {555--565}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653729}, doi = {10.1145/1653662.1653729}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CarboneCLLPJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangJCWG09, author = {Zhi Wang and Xuxian Jiang and Weidong Cui and Xinyuan Wang and Mike Grace}, editor = {Michael Backes and Peng Ning}, title = {ReFormat: Automatic Reverse Engineering of Encrypted Messages}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {200--215}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_13}, doi = {10.1007/978-3-642-04444-1\_13}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangJCWG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/RileyJX09, author = {Ryan D. Riley and Xuxian Jiang and Dongyan Xu}, editor = {Wolfgang Schr{\"{o}}der{-}Preikschat and John Wilkes and Rebecca Isaacs}, title = {Multi-aspect profiling of kernel rootkit behavior}, booktitle = {Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009}, pages = {47--60}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519065.1519072}, doi = {10.1145/1519065.1519072}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/RileyJX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWYFJ09, author = {Ruishan Zhang and Xinyuan Wang and Xiaohui Yang and Ryan Farley and Xuxian Jiang}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {59--70}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_6}, doi = {10.1007/978-3-642-00843-6\_6}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWYFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MaoLCJ09, author = {Ziqing Mao and Ninghui Li and Hong Chen and Xuxian Jiang}, editor = {Barbara Carminati and James Joshi}, title = {Trojan horse resistant discretionary access control}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {237--246}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542244}, doi = {10.1145/1542207.1542244}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/MaoLCJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/JiangBWXWS08, author = {Xuxian Jiang and Florian P. Buchholz and Aaron Walters and Dongyan Xu and Yi{-}Min Wang and Eugene H. Spafford}, title = {Tracing Worm Break-In and Contaminations via Process Coloring: {A} Provenance-Preserving Approach}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {19}, number = {7}, pages = {890--902}, year = {2008}, url = {https://doi.org/10.1109/TPDS.2007.70765}, doi = {10.1109/TPDS.2007.70765}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/JiangBWXWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LinJXZ08, author = {Zhiqiang Lin and Xuxian Jiang and Dongyan Xu and Xiangyu Zhang}, title = {Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/automatic-protocol-format-reverse-engineering-through-context-aware-monitored-execution/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LinJXZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RileyJX08, author = {Ryan D. Riley and Xuxian Jiang and Dongyan Xu}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {1--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_1}, doi = {10.1007/978-3-540-87403-4\_1}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RileyJX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangJCW08, author = {Zhi Wang and Xuxian Jiang and Weidong Cui and Xinyuan Wang}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Countering Persistent Kernel Rootkits through Systematic Hook Discovery}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {21--38}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_2}, doi = {10.1007/978-3-540-87403-4\_2}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangJCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RamsbrockWJ08, author = {Daniel Ramsbrock and Xinyuan Wang and Xuxian Jiang}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A First Step towards Live Botmaster Traceback}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {59--77}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_4}, doi = {10.1007/978-3-540-87403-4\_4}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RamsbrockWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangZYJW08, author = {Xinyuan Wang and Ruishan Zhang and Xiaohui Yang and Xuxian Jiang and Duminda Wijesekera}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Voice pharming attack and the trust of VoIP}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {24}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460908}, doi = {10.1145/1460877.1460908}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WangZYJW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangWX07, author = {Xuxian Jiang and Xinyuan Wang and Dongyan Xu}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {128--138}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315262}, doi = {10.1145/1315245.1315262}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiangWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RileyJX07, author = {Ryan D. Riley and Xuxian Jiang and Dongyan Xu}, title = {An Architectural Approach to Preventing Code Injection Attacks}, booktitle = {The 37th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK, Proceedings}, pages = {30--40}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DSN.2007.13}, doi = {10.1109/DSN.2007.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/RileyJX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangW07, author = {Xuxian Jiang and Xinyuan Wang}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {198--218}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_11}, doi = {10.1007/978-3-540-74320-0\_11}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XuJSZ07, author = {Min Xu and Xuxian Jiang and Ravi S. Sandhu and Xinwen Zhang}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {Towards a VMM-based usage control framework for {OS} kernel integrity protection}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {71--80}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266852}, doi = {10.1145/1266840.1266852}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/XuJSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/JiangWXW07, author = {Xuxian Jiang and Helen J. Wang and Dongyan Xu and Yi{-}Min Wang}, title = {RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization}, booktitle = {26th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2007), Beijing, China, October 10-12, 2007}, pages = {209--218}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SRDS.2007.36}, doi = {10.1109/SRDS.2007.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/JiangWXW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/ZhangWYJ07, author = {Ruishan Zhang and Xinyuan Wang and Xiaohui Yang and Xuxian Jiang}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {Billing Attacks on SIP-Based VoIP Systems}, booktitle = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/woot-07/billing-attacks-sip-based-voip-systems}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/woot/ZhangWYJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Jiang06, author = {Xuxian Jiang}, title = {Enabling Internet worms and malware investigation and defense using virtualization}, school = {Purdue University, {USA}}, year = {2006}, url = {https://docs.lib.purdue.edu/dissertations/AAI3251634}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Jiang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/JiangXW06, author = {Xuxian Jiang and Dongyan Xu and Yi{-}Min Wang}, title = {Collapsar: {A} VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention}, journal = {J. Parallel Distributed Comput.}, volume = {66}, number = {9}, pages = {1165--1180}, year = {2006}, url = {https://doi.org/10.1016/j.jpdc.2006.04.012}, doi = {10.1016/J.JPDC.2006.04.012}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/JiangXW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JiangWXSBW06, author = {Xuxian Jiang and Aaron Walters and Dongyan Xu and Eugene H. Spafford and Florian P. Buchholz and Yi{-}Min Wang}, title = {Provenance-Aware Tracing ofWorm Break-in and Contaminations: {A} Process Coloring Approach}, booktitle = {26th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal}, pages = {38}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDCS.2006.69}, doi = {10.1109/ICDCS.2006.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/JiangWXSBW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangBJRVCK06, author = {Yi{-}Min Wang and Doug Beck and Xuxian Jiang and Roussi Roussev and Chad Verbowski and Shuo Chen and Samuel T. King}, title = {Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/automated-web-patrol-strider-honeymonkeys-finding-web-sites-exploit-browser-vulnerabilities/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangBJRVCK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/JiangX06, author = {Xuxian Jiang and Dongyan Xu}, editor = {Farnam Jahanian}, title = {Profiling self-propagating worms via behavioral footprinting}, booktitle = {Proceedings of the 2006 {ACM} Workshop on Rapid Malcode, {WORM} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {17--24}, publisher = {{ACM} Press}, year = {2006}, url = {https://doi.org/10.1145/1179542.1179547}, doi = {10.1145/1179542.1179547}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/JiangX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RuthJXG05, author = {Paul Ruth and Xuxian Jiang and Dongyan Xu and Sebastien Goasguen}, title = {Virtual Distributed Environments in a Shared Infrastructure}, journal = {Computer}, volume = {38}, number = {5}, pages = {63--69}, year = {2005}, url = {https://doi.org/10.1109/MC.2005.175}, doi = {10.1109/MC.2005.175}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/RuthJXG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangXWS05, author = {Xuxian Jiang and Dongyan Xu and Helen J. Wang and Eugene H. Spafford}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Virtual Playgrounds for Worm Behavior Investigation}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {1--21}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_1}, doi = {10.1007/11663812\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiangXWS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/JiangXE04, author = {Xuxian Jiang and Dongyan Xu and Rudolf Eigenmann}, title = {Protection mechanisms for application service hosting platforms}, booktitle = {4th {IEEE/ACM} International Symposium on Cluster Computing and the Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}}, pages = {656--663}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CCGrid.2004.1336693}, doi = {10.1109/CCGRID.2004.1336693}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/JiangXE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/JiangX04, author = {Xuxian Jiang and Dongyan Xu}, editor = {Jiannong Cao and Laurence Tianruo Yang and Minyi Guo and Francis Chi{-}Moon Lau}, title = {{VIOLIN:} Virtual Internetworking on Overlay Infrastructure}, booktitle = {Parallel and Distributed Processing and Applications, Second InternationalSymposium, {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3358}, pages = {937--946}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30566-8\_107}, doi = {10.1007/978-3-540-30566-8\_107}, timestamp = {Tue, 14 Apr 2020 13:23:10 +0200}, biburl = {https://dblp.org/rec/conf/ispa/JiangX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/XuJ04, author = {Dongyan Xu and Xuxian Jiang}, editor = {Henning Schulzrinne and Nevenka Dimitrova and Martina Angela Sasse and Sue B. Moon and Rainer Lienhart}, title = {Towards an integrated multimedia service hosting overlay}, booktitle = {Proceedings of the 12th {ACM} International Conference on Multimedia, New York, NY, USA, October 10-16, 2004}, pages = {96--103}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1027527.1027545}, doi = {10.1145/1027527.1027545}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/XuJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiangX04, author = {Xuxian Jiang and Dongyan Xu}, editor = {Matt Blaze}, title = {Collapsar: {A} VM-Based Architecture for Network Attack Detention Center}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {15--28}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/jiang.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiangX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/JiangX03, author = {Xuxian Jiang and Dongyan Xu}, title = {{SODA:} {A} Service-On-Demand Architecture for Application Service Hosting Utility Platforms}, booktitle = {12th International Symposium on High-Performance Distributed Computing {(HPDC-12} 2003), 22-24 June 2003, Seattle, WA, {USA}}, pages = {174--183}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/HPDC.2003.1210027}, doi = {10.1109/HPDC.2003.1210027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpdc/JiangX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/JiangDXB03, author = {Xuxian Jiang and Yu Dong and Dongyan Xu and Bharat K. Bhargava}, title = {GnuStream: a {P2P} media streaming system prototype}, booktitle = {Proceedings of the 2003 {IEEE} International Conference on Multimedia and Expo, {ICME} 2003, 6-9 July 2003, Baltimore, MD, {USA}}, pages = {325--328}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICME.2003.1221619}, doi = {10.1109/ICME.2003.1221619}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/JiangDXB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mometools/JiangX03, author = {Xuxian Jiang and Dongyan Xu}, editor = {Georg Carle and Hartmut Ritter and Klaus Wehrle}, title = {vBET: a VM-based emulation testbed}, booktitle = {Proceedings of the {ACM} {SIGCOMM} workshop on Models, methods and tools for reproducible network research, MoMeTools '03, Karlsruhe, Germany, August 25-27, 2003}, pages = {95--104}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/944773.944789}, doi = {10.1145/944773.944789}, timestamp = {Sat, 12 Nov 2022 13:04:34 +0100}, biburl = {https://dblp.org/rec/conf/mometools/JiangX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.